CVE-2015-5310

Priority
Description
The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly
ignore key data in response frames when management frame protection (MFP)
was not negotiated, which allows remote attackers to inject arbitrary
broadcast or multicast packets or cause a denial of service (ignored
packets) via a WNM Sleep Mode response.
Assigned-to
mdeslaur
Notes
Package
Source: wpa (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):released (2.1-0ubuntu1.4)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.4-0ubuntu5)
Package
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
More Information

Updated: 2019-12-05 18:42:21 UTC (commit dd38ff22974aae499eb50644b9d5a2817483cbdb)